The Rise of Encrypted Traffic

随着数据安全及隐私合规需求的增长,加密通信使用率迅速提升。据研究显示,当前组织内部网络流量中有25%到35%为加密流量,并且预计这一比例将持续上升。加密流量不仅在桌面端增加,在移动端亦然。然而,加密流量也为高级威胁和恶意软件提供了隐蔽通道,对企业安全构成了挑战。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

The Rise of Encrypted Traffic

Greg Mayfield

Based on proven standards like Secure Sockets Layer (SSL) and Transport Layer Security (TLS), encrypted communication is, unquestionably, growing rapidly. NSS Research found that 25% to 35% of network traffic is encrypted within most organizations today, and will continue to rise 1. Due to growing data security, privacy and compliance concerns, organizations worldwide are utilizing more SSL encrypted traffic. Additionally, Gartner believes that by 2017, more than half of the network attacks targeting enterprises will use encrypted traffic to bypass controls 2. Although the increasing pervasiveness of Cloud and mobile-based services offers significant benefits to enterprises, the encrypted traffic that protects data from being viewed within these modern applications also creates a blind spot that can be exploited by advanced threats and malware.

Research conducted by Canadian broadband management company Sandvine, found that the number of Internet users encrypting their online communications has doubled in North America, and quadrupled in Latin America and Europe over just the past year 3. The rise in SSL encrypted traffic is not restricted to desktops, as the mobile community is also using increasingly more encryption for communications. While the encrypted internet traffic figures are not tremendously large – at 6.1%, 3.8% and 10.4%, respectively – the overall growth is significant to users and businesses worldwide as it may be a harbinger of new security models.

Data breaches and other activities have spawned a renewed interest in privacy and policies protecting confidential user data, so the increased use of encryption is really not that surprising. Web and content service providers like Google, Dropbox and Salesforce.com, as well as application developers such as Yahoo, Amazon Web Services (AWS) and Microsoft, have been migrating to encrypted communications as a default for some time.

Perhaps what’s of greater concern is the rapid increase in advanced persistent threats (APTs) and malware that hide in encrypted traffic and evade detection by conventional security tools. In fact, advanced malware and encrypted traffic played a role in almost every major breach in 2013 and 2014. While more than 25% of outbound web traffic is now encrypted, 80% of security systems do not recognize or prevent threats within SSL traffic 2.

To identify hidden threats to the business, enterprises need complete visibility into the encrypted traffic coming in and out of the network. However, to comply with local privacy regulations that protect certain classes of data — such as financial or health-related — as well as with corporate policies on the acceptable use of applications, organizations must be able to selectively decrypt network traffic. An encrypted traffic management strategy that considers the various business needs, the corporate policies established, and the compliance mandates for your industry is essential. Click here to learn more about Blue Coat’s encrypted traffic management products.

 

1 W. Pirc, "SSL Performance Problems: Significant SSL Performance Loss Leaves Much Room for Improvement," NSS Labs, June 2013.

2 Jeremy D’Hoinne, Adam Hills, “Security leaders Must address threats from Rising SSL Traffic”, Gartner, December 2013.

3 Sandvine, “Global Internet Phenomena Report,” May 2014.

内容概要:本文探讨了在MATLAB/SimuLink环境中进行三相STATCOM(静态同步补偿器)无功补偿的技术方法及其仿真过程。首先介绍了STATCOM作为无功功率补偿装置的工作原理,即通过调节交流电压的幅值和相位来实现对无功功率的有效管理。接着详细描述了在MATLAB/SimuLink平台下构建三相STATCOM仿真模型的具体步骤,包括创建新模型、添加电源和负载、搭建主电路、加入控制模块以及完成整个电路的连接。然后阐述了如何通过对STATCOM输出电压和电流的精确调控达到无功补偿的目的,并展示了具体的仿真结果分析方法,如读取仿真数据、提取关键参数、绘制无功功率变化曲线等。最后指出,这种技术可以显著提升电力系统的稳定性与电能质量,展望了STATCOM在未来的发展潜力。 适合人群:电气工程专业学生、从事电力系统相关工作的技术人员、希望深入了解无功补偿技术的研究人员。 使用场景及目标:适用于想要掌握MATLAB/SimuLink软件操作技能的人群,特别是那些专注于电力电子领域的从业者;旨在帮助他们学会建立复杂的电力系统仿真模型,以便更好地理解STATCOM的工作机制,进而优化实际项目中的无功补偿方案。 其他说明:文中提供的实例代码可以帮助读者直观地了解如何从零开始构建一个完整的三相STATCOM仿真环境,并通过图形化的方式展示无功补偿的效果,便于进一步的学习与研究。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值